A FORENSIC PERSPECTIVE ON THE USE OF EVENT VIEWER FOR DETECTING MALICIOUS ACTIVITIES AND ENSURING SYSTEM INTEGRITY

Authors

  • Premal Patel Silver Oak University https://orcid.org/0009-0004-4328-3335
  • Pina M. Bhatt Department of Mechanical Engineering, College of Technology, Silver Oak University, Ahmedabad, Gujarat - 382481, India.
  • Umang Parmar Department of Mechanical Engineering, Aditya Silver Oak Institute of Technology, Silver Oak University, Ahmedabad, Gujarat - 382481, India
  • Keval Bhavsar Department of Mechanical Engineering, Aditya Silver Oak Institute of Technology, Silver Oak University, Ahmedabad, Gujarat - 382481, India

DOI:

https://doi.org/10.29121/shodhkosh.v5.i1.2024.5975

Keywords:

Digital Forensics, Event Viewer, Windows Logs, XML Storage, System Integrity, Malware Detection, Log Analysis, Timeline Reconstruction, Cyber-security, Incident Response

Abstract [English]

Event Viewer is a vital tool embedded within Microsoft Windows that records a wide range of system, security, and application-related events. For forensic investigators, these logs are crucial in identifying signs of malicious activities, reconstructing timelines, and maintaining system integrity. This paper highlights the role of Event Viewer in digital forensics, discussing how specific logs from various categories—Application, Security, Setup, System, and Forwarded Events—can be extracted, parsed, and stored in XML format for in-depth analysis. Furthermore, the paper proposes a structured XML-based data model for efficient forensic storage and analysis, compares it with other log management approaches, and demonstrates its effectiveness in digital investigations.

References

Garfinkel, S. (2010). Digital forensics XML and structured storage. Digital Investigation.

Casey, E. (2011). Digital evidence and computer crime. Academic Press.

Mitropoulos, S., Karakoidas, V., Spinellis, D., & Louridas, P. (2019). Real-time event log analysis. IEEE Access.

Microsoft Docs. (2020). Event Viewer documentation. https://learn.microsoft.com

SANS Institute. (2022). Event log analysis. https://www.sans.org/white-papers/event-log-analysis/

Carrier, B. (2005). File system forensic analysis. Addison-Wesley.

Altheide, C., & Carvey, H. (2011). Digital forensics with open source tools. Syngress. DOI: https://doi.org/10.1016/B978-1-59749-586-8.00001-7

Reith, M., Carr, C., & Gunsch, G. (2002). An examination of digital forensic models. International Journal of Digital Evidence, 1(3).

National Institute of Standards and Technology. (2006). Guide to integrating forensic techniques into incident response (SP 800-86). https://csrc.nist.gov/publications/detail/sp/800-86/final

CrowdStrike. (2023). Endpoint detection and log management. https://www.crowdstrike.com

IBM X-Force. Event log analysis case studies. https://www.ibm.com/security/xforce

Mandia, K., Prosise, C., & Pepe, M. (2003). Incident response & computer forensics. McGraw-Hill.

Microsoft. (2023). LogParser tool documentation. https://learn.microsoft.com/en-us/sql/tools/logparser

Zimmerman, E.. EvtxECmd documentation. https://ericzimmerman.github.io

National Cyber Security Centre (UK). (2023). Windows event logging guidance. https://www.ncsc.gov.uk

Stallings, W. (2019). Computer security: Principles and practice. Pearson.

Kaspersky Labs. (2023). Best practices for log analysis. https://www.kaspersky.com

Sophos. (2022). Investigating Windows logs during threat hunts. https://www.sophos.com

AlienVault Labs. (2023). Log correlation techniques. https://cybersecurity.att.com

Patel, P. C. (2013). Aggregation of digital forensics evidences. Int J Comput Trends Technol (IJCTT), 4(4), 881-884.

Downloads

Published

2024-06-30

How to Cite

Patel, P., Bhatt, P. M., Parmar, U., & Keval Bhavsar. (2024). A FORENSIC PERSPECTIVE ON THE USE OF EVENT VIEWER FOR DETECTING MALICIOUS ACTIVITIES AND ENSURING SYSTEM INTEGRITY. ShodhKosh: Journal of Visual and Performing Arts, 5(1), 3250–3256. https://doi.org/10.29121/shodhkosh.v5.i1.2024.5975